Security News

Australia Pushes 'Five Eyes' for Tools to Counter Encryption (InfoRiskToday)
2017-06-26 13:18

But Australia Doesn't Want Backdoors. So What Does It Want?Worried about the use of encryption by terrorists, Australia plans to lobby its key signal intelligence partners at a meeting in Canada...

As UK govt calls for encryption backdoors, EU lawmakers propose a ban on them (Help Net Security)
2017-06-20 17:26

As the UK gets hit by terror attacks one after the other, the government’s cry for making sure terrorists and criminals can’t find “safe spaces” online has become a constant. Some European...

Equipment already in space can be adapted for extremely secure data encryption (Help Net Security)
2017-06-19 12:30

In a new study, researchers from the Max Planck Institute in Erlangen, demonstrate ground-based measurements of quantum states sent by a laser aboard a satellite 38,000 kilometers above Earth....

European Parliament Proposes Ban On Encryption Backdoors (The Hackers News)
2017-06-19 04:52

Prime Minister Theresa May wants tech companies, like Facebook, Apple, and Google, to create controversial 'backdoors' for police, but even somewhere she knows that it's not that easy as it...

End-to-end email encryption with no central point of attack (Help Net Security)
2017-06-15 19:04

A seamless, easy-to-use, and secure end-to-end encrypted business collaboration tool with no central point of attack is a holy grail for every business, and Boston-based security company PreVeil...

ICIT Calls for Legislation to Enforce Encryption on Government Agencies (Security Week)
2017-06-08 15:16

The starting point for a new study from the Institute for Critical Infrastructure Technology is not new: "There are only two types of networks, those that have been compromised and those that are...

SSH Configuration on Nexpose Servers Allowed Weak Encryption Algorithms (Threatpost)
2017-06-02 16:46

Rapid7 warned this week that its Nexpose appliances were shipped with a SSH configuration that could have let obsolete algorithms be used for key exchange.

Available Tools Making Dent in WannaCry Encryption (Threatpost)
2017-05-19 17:04

Tools are beginning to emerge that can be used to begin the process of recovering files encrypted by WannaCry on some Windows systems.